First published: Tue Feb 23 2016(Updated: )
Session fixation vulnerability in Apache Tomcat 7.x before 7.0.66, 8.x before 8.0.30, and 9.x before 9.0.0.M2, when different session settings are used for deployments of multiple versions of the same web application, might allow remote attackers to hijack web sessions by leveraging use of a requestedSessionSSL field for an unintended request, related to CoyoteAdapter.java and Request.java.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/tomcat | <7.0.67 | 7.0.67 |
redhat/tomcat | <8.0.32 | 8.0.32 |
maven/org.apache.tomcat:tomcat | >=7.0.0<=7.0.65 | 7.0.66 |
maven/org.apache.tomcat:tomcat | >=8.0.0.RC1<=8.0.30 | 8.0.31 |
maven/org.apache.tomcat:tomcat | =9.0.0.M1 | 9.0.0.M2 |
Apache Tomcat | =7.0.0-beta | |
Apache Tomcat | =7.0.2-beta | |
Apache Tomcat | =7.0.4-beta | |
Apache Tomcat | =7.0.5-beta | |
Apache Tomcat | =7.0.6 | |
Apache Tomcat | =7.0.10 | |
Apache Tomcat | =7.0.11 | |
Apache Tomcat | =7.0.12 | |
Apache Tomcat | =7.0.14 | |
Apache Tomcat | =7.0.16 | |
Apache Tomcat | =7.0.19 | |
Apache Tomcat | =7.0.20 | |
Apache Tomcat | =7.0.21 | |
Apache Tomcat | =7.0.22 | |
Apache Tomcat | =7.0.23 | |
Apache Tomcat | =7.0.25 | |
Apache Tomcat | =7.0.26 | |
Apache Tomcat | =7.0.27 | |
Apache Tomcat | =7.0.28 | |
Apache Tomcat | =7.0.29 | |
Apache Tomcat | =7.0.30 | |
Apache Tomcat | =7.0.32 | |
Apache Tomcat | =7.0.33 | |
Apache Tomcat | =7.0.34 | |
Apache Tomcat | =7.0.35 | |
Apache Tomcat | =7.0.37 | |
Apache Tomcat | =7.0.39 | |
Apache Tomcat | =7.0.40 | |
Apache Tomcat | =7.0.41 | |
Apache Tomcat | =7.0.42 | |
Apache Tomcat | =7.0.47 | |
Apache Tomcat | =7.0.50 | |
Apache Tomcat | =7.0.52 | |
Apache Tomcat | =7.0.53 | |
Apache Tomcat | =7.0.54 | |
Apache Tomcat | =7.0.55 | |
Apache Tomcat | =7.0.56 | |
Apache Tomcat | =7.0.57 | |
Apache Tomcat | =7.0.59 | |
Apache Tomcat | =7.0.61 | |
Apache Tomcat | =7.0.62 | |
Apache Tomcat | =7.0.63 | |
Apache Tomcat | =7.0.64 | |
Apache Tomcat | =7.0.65 | |
Apache Tomcat | =8.0.0-rc1 | |
Apache Tomcat | =8.0.0-rc10 | |
Apache Tomcat | =8.0.0-rc3 | |
Apache Tomcat | =8.0.0-rc5 | |
Apache Tomcat | =8.0.1 | |
Apache Tomcat | =8.0.3 | |
Apache Tomcat | =8.0.11 | |
Apache Tomcat | =8.0.12 | |
Apache Tomcat | =8.0.14 | |
Apache Tomcat | =8.0.15 | |
Apache Tomcat | =8.0.17 | |
Apache Tomcat | =8.0.18 | |
Apache Tomcat | =8.0.20 | |
Apache Tomcat | =8.0.21 | |
Apache Tomcat | =8.0.22 | |
Apache Tomcat | =8.0.23 | |
Apache Tomcat | =8.0.24 | |
Apache Tomcat | =8.0.26 | |
Apache Tomcat | =8.0.27 | |
Apache Tomcat | =8.0.28 | |
Apache Tomcat | =8.0.29 | |
Apache Tomcat | =9.0.0-milestone1 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =15.10 | |
Ubuntu Linux | =16.04 | |
Debian GNU/Linux | =7.0 | |
Debian GNU/Linux | =8.0 | |
Apache Tomcat | =9.0.0-m1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5346 is classified as a medium severity vulnerability due to its potential to allow remote session hijacking.
To mitigate CVE-2015-5346, upgrade Apache Tomcat to versions 7.0.67, 8.0.32, or 9.0.0.M2 or later.
CVE-2015-5346 affects Apache Tomcat versions 7.x prior to 7.0.66, 8.x prior to 8.0.30, and 9.x prior to 9.0.0.M2.
CVE-2015-5346 allows attackers to hijack user sessions through session fixation attacks.
CVE-2015-5346 is exploitable when different session settings are used for multiple deployments of the same web application.